lanmaster53 / honeybadger
☆230Updated 5 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- ☆199Updated 3 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆167Updated 7 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆249Updated 2 years ago
- Passive internal reconnaissance tool☆70Updated 2 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 9 months ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated 10 months ago
- LinkedIn reconnaissance tool☆52Updated 3 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Web application to create indexes for GIAC certification examinations.☆141Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆221Updated 5 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- ☆132Updated 4 years ago
- Gather Open-Source Intelligence using PowerShell.☆173Updated 5 years ago
- an awesome list of active defense resources☆120Updated 4 years ago
- ☆206Updated 7 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆126Updated 5 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated 11 months ago
- ☆234Updated 4 years ago
- A modular recon tool for pentesting☆240Updated 7 years ago
- Lure - User Recon Automation for GoPhish☆163Updated last year
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 3 years ago
- Pastebin OSINT Harvester☆323Updated 6 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Monitor geotagged social media from multiple platforms in real time.☆77Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Tools to automate and/or expedite response.☆114Updated 10 months ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 3 years ago